Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Enterprise-Grade IT Security for Small and Medium Businesses - Denny Cherry

Enterprise-Grade IT Security for Small and Medium Businesses (eBook)

Building Security Systems, in Plain English

(Autor)

eBook Download: PDF
2022 | 1st ed.
XII, 153 Seiten
Apress (Verlag)
978-1-4842-8628-9 (ISBN)
Systemvoraussetzungen
62,99 inkl. MwSt
(CHF 61,50)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. 

Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the 'why' of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. 


You Will Learn
  • The importance of multi-factor authentication
  • The limits of what multi-factor authentication can protect
  • How firewalls are used to protect your company from attackers
  • What zero-trust environments are and what they mean
  • Whether zero-trust networks are what is needed to secure your own environment
  • The security benefits from implementing a network segmentation policy
  • The best ways to access files and resources from remote locations outside the office

Who This Book Is For

Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their business relies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement




?Denny Cherry has been working in the information technology field for ore than 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN Magazine, and SQL Server Magazine, as well as having spoken at dozens of conferences around the world. He holds the Microsoft Certified Master certification, has been awarded the Microsoft Most Valuable Professional (MVP) award annually for more than 15 years, and has been awarded the VMware vExpert award six times. His public speaking started at local events in Southern California where he lives with his wife and their pet bunny rabbits and has expanded out to events worldwide. Speaking at conferences has taken Denny to six continents and over a dozen countries where he speaks at both small local events as well as large industry and corporate events.
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "e;why"e; of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will LearnThe importance of multi-factor authenticationThe limits of what multi-factor authentication can protectHow firewalls are used to protect your company from attackersWhat zero-trust environments are and what they meanWhether zero-trust networks are what is needed to secure your own environmentThe security benefits from implementing a network segmentation policyThe best ways to access files and resources from remote locations outside the officeWho This Book Is ForManagers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their businessrelies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement
Erscheint lt. Verlag 16.9.2022
Zusatzinfo XII, 153 p. 55 illus.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Mathematik / Informatik Informatik Software Entwicklung
Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
Naturwissenschaften
Wirtschaft Betriebswirtschaft / Management Allgemeines / Lexika
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Schlagworte blacklists • Creating a Small Business Cybersecurity Program • Cybersecurity for Small and Midsize Businesses • Distributed Denial of Service Attacks • Employee Training • Firewalls • Multi-Factor Authentication (MFA) • Network Penetration • Network Segmentation • Remote Access Solutions • Remote Connectivity • The Cybersecurity Manager's Guide • The Essential Guide to Cybersecurity for SMBs • Virtual private network (VPN) • Whitelists • Zero Trust Environments
ISBN-10 1-4842-8628-6 / 1484286286
ISBN-13 978-1-4842-8628-9 / 9781484286289
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95